IoT & Mobile Application Penetration Testing: Our team will reverse your mobile and IoT applications for security vulnerabilties. Our team has a proven track record of finding vulnerabilities in mobile applications and IoT products. Common findings include: insecure storage, IPC implementation flaws, lack of certificate pinning, blue tooth communcation mistakes, and firmware issues.
Training Courses: The following courses are offered below
- Intro to Metasploit: this course covers the basic of the metasploit framework.
- Intro to x86: Basics of the stack, registers, and 20 instructions
- Intro to Android Reverse Engineering: Covers basic of android apps, app components, dalvik assembly language
- Android App Vulnerabilities: Common techniques commonly used to find vulns for bug bounty programs
Expert Witness: Need a particular application reversed and its capabilities explained to an audience of various technical skillsets. Contact us.